BackdoorScanningforDeepNeuralNetworksthroughK-ArmOptimizationGuangyuShen1YingqiLiu1GuanhongTao1ShengweiAn1QiulingXu1SiyuanCheng1ShiqingMa2XiangyuZhang1Abstractdoor)attackexploitstheuninterpretabili...